shaddy43 / AES_Shellcode_Encryptor
This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. Process of encrypting shellcode is very important for injection processes to bypass signature based detection by the security controls.
☆15Updated 3 years ago
Alternatives and similar repositories for AES_Shellcode_Encryptor:
Users that are interested in AES_Shellcode_Encryptor are comparing it to the libraries listed below
- A more advanced free and open .NET obfuscator using dnlib.☆10Updated 2 years ago
- JALSI - Just Another Lame Shellcode Injector☆30Updated 3 years ago
- Find kernel32 base and API addresses. Simple C++ implementation☆24Updated 2 years ago
- C# project to Reflectively load .Net assemblies in memory☆17Updated 9 months ago
- One gate to all syscalls!☆23Updated 3 years ago
- An attempt to make a LoadLibrary designed for offensive operations, in C# obviously.☆55Updated 3 years ago
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆31Updated 2 years ago
- A Python script that embeds Target VBS into LNK and when executed runs the VBS script from within.☆32Updated 2 years ago
- A repository filled with ideas to break/detect direct syscall techniques☆27Updated 2 years ago
- C# loader capable of running stage-1 from remote url, file path as well as file share☆17Updated 2 years ago
- A python port of CCob's ThreadlessInject☆25Updated 2 years ago
- C code to enable ETW tracing for Dotnet Assemblies☆31Updated 2 years ago
- Beacon Object File implementation of Yaxser's Backstab☆15Updated 3 years ago
- A console obfuscator for .NET assemblies.☆10Updated 2 years ago
- ☆28Updated 4 years ago
- A simple injector that uses LoadLibraryA☆17Updated 4 years ago
- Beacon Object Files used for Cobalt Strike☆17Updated last year
- ShootCutMe an .LNK file creator tool for redteamer☆13Updated 5 months ago
- Windows File Enumeration Intel Gathering Tool.☆17Updated last year
- This POC provides the possibilty to execute x86 shellcode in form of a .bin file based on x86 inline assembly☆18Updated last year
- Example of using Sleep to create better named pipes.☆41Updated last year
- A .NET binary loader that bypasses AMSI☆44Updated 3 years ago
- Modified Version of Melkor @FuzzySecurity capable of creating disposable AppDomains in injected processes.☆27Updated 3 years ago
- SharpReg is a simple code set to interact with the Remote Registry service api and is compatible with Cobalt Strike.☆27Updated 4 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- C# implementation of Shellcode delivery techniques using PInvoke and DInvoke variations for API calling.☆35Updated 3 years ago
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 2 years ago
- Small POC for process ghosting☆39Updated 3 years ago
- AMSI Bypass for powershell☆30Updated 2 years ago
- ☆29Updated 2 years ago